SET Error on port 80

Hello
When i run social engineering tool kit i get this error :Something is running on port 80. Seeing if it’s a stale SET process.
i used Java Applet Attack Method-Site – site cloner. i restarted SET & still the problem persists,please suggest me how to solve this ?

Thank you

set:payloads> PORT of the listener [443]:
[*] Done, moving the payload into the action.
[-] Targetting of OSX/Linux (POSIX-based) as well. Prepping posix payload…
[*] Stager turned off, prepping direct download payload…
[*] Please note that the SETSHELL and RATTE are not compatible with the powershell injection technique. Disabling the powershell attack.
[!] ERROR:Something is running on port 80. Seeing if it’s a stale SET process…
[!] If you want to use Apache, edit the config/set_config
[!] Exit whatever is listening and restart SET

# USE APACHE INSTEAD OF STANDARD PYTHON WEB SERVERS, THIS WILL INCREASE SPEED OF
# THE ATTACK VECTOR
APACHE_SERVER=ON

Thanks now it works without any problem, did exactly as you said, however , in the mean while iam faced with another problem, metasploit wont load in SET (waited for minutes )when i use java applet attack method,any idea what could be causing this ?

info…

–] Tested on IE6, IE7, IE8, IE9, Safari, Opera, Chrome, and FireFox
Apache web server is currently in use for performance.

[*] Moving payload into cloned website.
[*] The site has been moved. SET Web Server is now listening..
[-] Launching MSF Listener…
[-] This may take a few to load MSF…

Yep, hell_razor is right. I was going off memory. Just checked and they did drop the 3. However, I thought SET threw an error when it used the wrong dir.

sorry bro.. i did what mr. razor told tried each one of them /pentest/exploits/framework & /opt/metasploit/msf3, its out of luck, its same again, updated metasploit & SET too before this. well i’ll try to reinstall Backtrack 5R2 O.S… guess this would work..

METASPLOIT_DATABASE=postgresql
HOW MANY TIMES SET SHOULD ENCODE A PAYLOAD IF YOU ARE USING STANDARD METASPLO
ENCOUNT=4
AUTO_MIGRATE=OFF
BACKDOOR_EXECUTION=ON
METASPLOIT_IFRAME_PORT=8080
DSNIFF=OFF
AUTO_DETECT=OFF
SENDMAIL=ON
EMAIL_PROVIDER=GMAIL
WEBATTACK_EMAIL=ON
APACHE_SERVER=ON
SELF_SIGNED_APPLET=ON
WEBATTACK_SSL=OFF
OSX_REVERSE_PORT=8080
AUTOMATIC_LISTENER=ON
SET_SHELL_STAGER=OFF
METASPLOIT_MODE=ON

Yeah, something is definitely going bonkers…you can always do an apt-get remove set –purge and then apt-get install set and set-update…you can do the same to metasploit, but it may be more cantankerous.

Author

Posts

You must be logged in to reply to this topic.

Upcoming Webinars

– EH-Net Live! June –Details Coming Soon!

Past Webinars

– EH-Net Live! April – Video & Deck Now Available! for “Safe Harbor for Hackers” w/ Chloé Messdaghi and Jason Haddix of Bugcrowd from April 24.